Skip to content

Commit ad66be2

Browse files
committed
change wording around mcp auth spec
1 parent 692e5bf commit ad66be2

File tree

2 files changed

+2
-8
lines changed

2 files changed

+2
-8
lines changed

docs/source/guides/auth.mdx

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,7 @@ title: Authorization with Apollo MCP Server
44

55
The Apollo MCP server supports authorizing clients (e.g., LLMs) in accordance with [the MCP specification](https://modelcontextprotocol.io/specification/2025-06-18/basic/authorization).
66

7-
<Callout type="note">
8-
The current implementation passes through OAuth tokens from MCP clients directly to upstream GraphQL APIs, which violates the MCP specification. See [Limitations](/apollo-mcp-server/limitations#authorization-token-passthrough) for details and security considerations.
9-
</Callout>
7+
The current implementation passes through OAuth tokens from MCP clients directly to upstream GraphQL APIs. You can read more about [security considerations](/apollo-mcp-server/limitations#oauth-token-passthrough) when using this feature.
108

119
## Implement authorization with Apollo MCP Server
1210

docs/source/limitations.mdx

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,9 @@ This feature is [experimental](/graphos/resources/feature-launch-stages#experime
1414

1515
Apollo MCP Server currently passes through OAuth tokens received from MCP clients directly to upstream GraphQL APIs.
1616

17-
This behavior violates the [MCP Authorization specification](https://modelcontextprotocol.io/specification/2025-06-18/basic/authorization), which states:
18-
19-
> "If the MCP server makes requests to upstream APIs, it may act as an OAuth client to them. The access token used at the upstream API is a separate token, issued by the upstream authorization server. The MCP server MUST NOT pass through the token it received from the MCP client."
20-
2117
#### Rationale
2218

23-
The decision to pass through tokens stems from practical enterprise requirements that conflict with the MCP specification:
19+
The decision to pass through tokens stems from practical enterprise requirements that may conflict with the MCP specification. For example:
2420

2521
- **Multi-user scenarios**: Enterprise GraphQL APIs often require direct user identity to perform granular access control and tenant isolation.
2622
- **Existing enterprise patterns**: Many organizations have GraphQL APIs that depend on the original Authorization header to identify users and apply existing identity-based access controls.

0 commit comments

Comments
 (0)